Sciweavers

1923 search results - page 172 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
ICUMT
2009
14 years 7 months ago
Application of smoothed estimators in spectrum sensing technique based on model selection
In cognitive radio networks, secondary user (SU) does not have rights to transmit when the primary user (PU) band is occupied, that's why a sensing technique must be done. Rec...
Bassem Zayen, Aawatif Hayar, Hamza Debbabi, Hichem...
CCGRID
2002
IEEE
15 years 3 months ago
Towards an Economy-Based Optimisation of File Access and Replication on a Data Grid
We are working on a system for the optimised access and replication of data on a Data Grid. Our approach is based on the use of an economic model that includes the actors and the ...
Mark James Carman, Floriano Zini, Luciano Serafini...
GRID
2007
Springer
15 years 4 months ago
Fine-grained access control for GridFTP using SecPAL
– Grid access control policy languages today are generally one of two extremes: either extremely simplistic, or overly complex and challenging for even security experts to use. I...
Marty Humphrey, Sang-Min Park, Jun Feng, Norm Beek...
ICDCS
2010
IEEE
15 years 1 months ago
Sifting through Network Data to Cull Activity Patterns with HEAPs
—Today’s large campus and enterprise networks are characterized by their complexity, i.e. containing thousands of hosts, and diversity, i.e. with various applications and usage...
Esam Sharafuddin, Yu Jin, Nan Jiang, Zhi-Li Zhang
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 4 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...